Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 13:31
Static task
static1
Behavioral task
behavioral1
Sample
0e6df39d90613b3cfc5de18a7ec9703523a5dfb97963c9e1b551ef94b3519b54.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0e6df39d90613b3cfc5de18a7ec9703523a5dfb97963c9e1b551ef94b3519b54.exe
Resource
win10v2004-20241007-en
General
-
Target
0e6df39d90613b3cfc5de18a7ec9703523a5dfb97963c9e1b551ef94b3519b54.exe
-
Size
934KB
-
MD5
aa12317646e3cb2428737ba6efa9c3c0
-
SHA1
b0b9c09c821ff79cbe165e483f8d7fc18a35101f
-
SHA256
0e6df39d90613b3cfc5de18a7ec9703523a5dfb97963c9e1b551ef94b3519b54
-
SHA512
d9be04303daed679883830647005f64ab5d2641a5bb98522942d64d49c843f480553069632704037f11b1e2decc807409bf72cf7485824a5803b2c299d650e14
-
SSDEEP
12288:xytbV3kSoXaLnToslaosNxDo/9ThJ+NlPvOF89ThOHKZ7P3Xc9lm6RUfF:Qb5kSYaLTVlaVNxUTGbThOHK89c6RYF
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2108 cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2108 cmd.exe 2488 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2488 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2100 0e6df39d90613b3cfc5de18a7ec9703523a5dfb97963c9e1b551ef94b3519b54.exe 2100 0e6df39d90613b3cfc5de18a7ec9703523a5dfb97963c9e1b551ef94b3519b54.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2100 0e6df39d90613b3cfc5de18a7ec9703523a5dfb97963c9e1b551ef94b3519b54.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2108 2100 0e6df39d90613b3cfc5de18a7ec9703523a5dfb97963c9e1b551ef94b3519b54.exe 31 PID 2100 wrote to memory of 2108 2100 0e6df39d90613b3cfc5de18a7ec9703523a5dfb97963c9e1b551ef94b3519b54.exe 31 PID 2100 wrote to memory of 2108 2100 0e6df39d90613b3cfc5de18a7ec9703523a5dfb97963c9e1b551ef94b3519b54.exe 31 PID 2108 wrote to memory of 2488 2108 cmd.exe 33 PID 2108 wrote to memory of 2488 2108 cmd.exe 33 PID 2108 wrote to memory of 2488 2108 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e6df39d90613b3cfc5de18a7ec9703523a5dfb97963c9e1b551ef94b3519b54.exe"C:\Users\Admin\AppData\Local\Temp\0e6df39d90613b3cfc5de18a7ec9703523a5dfb97963c9e1b551ef94b3519b54.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\0e6df39d90613b3cfc5de18a7ec9703523a5dfb97963c9e1b551ef94b3519b54.exe"2⤵
- Deletes itself
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2488
-
-